SCAN TM White Paper. Scanned Channel Assigned Networking: A Unique Approach to High Efficiency Bandwidth Management
|
|
- Edith Payne
- 5 years ago
- Views:
Transcription
1 SCAN TM White Paper Scanned Channel Assigned Networking: A Unique Approach to High Efficiency Bandwidth Management LinkSat 3010 South Potter Drive Tempe, AZ USA (602) (602) sales@linksat.com
2 SCAN Conceptual Description SCAN is LinkSat s patented satellite bandwidth management solution. It is a fully automated ondemand satellite bandwidth management tool that utilizes local spectral analysis at each network node to determine availability of bandwidth for set-up of point-to-point and point-to-multipoint satellite carriers. Spectral analysis is employed at all of the satellite network sites (or access terminals) to track carrier activity in a pre-determined segment of satellite bandwidth. Each site in a SCAN network independently monitors carrier activity and, using the spectral activity data, automatically and autonomously makes decisions on when and where to transmit carriers and which receive carriers to acquire within a pre-defined segment of bandwidth. The concept is equivalent to an operator at a remote site constantly watching a spectrum analyzer screen. The operator first determines when bandwidth is needed by that site, then, on the basis of spectral activity, determines which spectrum segments are unoccupied, selects one of those segments, tunes a modulator to that frequency, then turns on a transmit carrier. The receiving sites all see the new carrier and tune an available demodulator to the frequency if one is available and if the carrier observed is in their channel map. The receiving sites all check to see if that carrier contains data for their local network. If it does not, they release the demodulator. This places the network management smarts at the end points of the circuit. This distributed network processing architecture means that no centralized network manager is necessary, which. The main benefits of the SCAN architecture are: Hub or hubless network topologies possible - analogous to Client / Server and Peer-to- Peer networking Multiple network architectures supported - STAR, Mesh or Partial Mesh networking, with multiple hubs if needed Minimal network software and hardware investment needed - allows cost effective deployment of small networks Distributed processing network management is distributed throughout the remotes minimizing single point failures Ethernet switch in-the-sky - enables full multipoint dynamic routing over satellite Reduced capital costs - improves overall network reliability and eliminates expensive hubs and high start-up costs The actual carrier sense and collision avoidance utilized in SCAN is similar to Carrier Sense Multiple Access- Collision Detection (CSMA-CD). The major difference between SCAN and CSMA-CD is that SCAN works in an environment with multiple carriers operating simultaneously over a satellite frequency band. Therefore, an appropriate name for the technique is Carrier Sense-Frequency Division Multiple Access-Collision Detection (CS-FDMA-CD). SCAN White Paper Page 2
3 CHANNEL ACCESS METHODS / MULTIPLE ACCESS PROTOCOLS FDMA OFDMA, WDMA, SC-FDMA TDMA MF-TDMA, STDMA CHANNEL BASED CDMA W-CDMA, TD-CDMA, OFHMA SDMA HC-SDMA PDMA PAMA Collision Recovery ALOHA, Slotted ALOHA, R-ALOHA PACKET BASED Collision Avoidance CSMA, CSMA/CD, CSMA/CA, MACA Collision Free Token Ring, Token Bus CHANNEL & PACKET BASED SCAN CS-FDMA/CD When the network is initially configured, a set of allowable channels within the satellite spectrum is defined. These channel maps are a set of definitions consisting of frequency assignments, data rates, FEC rates, and modulation types of allowed carriers. SCAN has the ability to determine carrier frequency, power, and occupied bandwidth. A simple channel map look up table allows the software to determine what the data rate and FEC rate are for a received carrier, and what data rate and FEC rate are needed for a transmit carrier. SCAN Channel Map Example The SCAN transmit sequence is initiated by activation of an application at the local network, for example a videoconference is started, or a VoIP call is dialed. When data packets (VoIP, IP video, FTP, MPEG4 video, etc) enter the LAN port of the router, the LinkIP looks for an available spectral channel appropriate for the service to be transmitted, and, when it finds one, it tunes a modulator to the frequency and sets the appropriate data rate/ FEC, and then begins to transmit. When data ceases entering the LAN port, or a local application is terminated, SCAN automatically commands the modulator to turn off the transmit carrier. When a carrier is transmitted to the satellite by any site in the network, the SCAN spectrum analyzers at all sites in the network will detect it. If the carrier channel is registered in the channel map of a particular site, the LinkIP will automatically tune a demodulator to the carrier frequency and data rate, and will acquire the carrier. The data is then demodulated and decompressed, each packet is inspected by the router, and those packets destined for its base station are routed out the LAN port. All received packets that are destined for other sites are discarded by the router. If the carrier has data for the local network, it will continue to downlink the carrier and route packets through its LAN port. If not, it will disregard the carrier and wait for a new event. The remote LinkXX routers can be equipped with multiple demodulators that can be used for multiple simultaneous circuits. Additional demodulators can also be used as backup demodulators for site redundancy. SCAN White Paper Page 3
4 The services platform with which SCAN interfaces is called the LinkXX. It is a powerful custom router that plays an important role in the bandwidth acquisition process for IP protocol networks. The router supports all commonly used routing protocols, including static routing, OSPF, BGP, RIPv1/v2, Multicast (IGMP), Unicast, Broadcast, DVB-MPE, and SIP. The router also provides a powerful data compression engine (LinkShrink), as well as a UDP client and server. See LinkSat s white paper entitled LinkXX Capabilities for more information on the LinkXX. The actual spectrum analyzer (scanner) hardware resides in the SCAN controller, and is a DSP FFT that captures signals in the band of interest. The scanner, in effect, constantly monitors the spectrum in real time. An initial spectral snapshot is sent to system memory when the SCAN controller is initialized. The spectral information is processed by the scanner, which then determines carrier power and bandwidth. It then compares that data with its channel allocation map. The channel map is a set of pre-defined allowable carriers that are programmed in software. Each spectral scan is very fast, in fact, an 80 MHz segment is scanned in less than 5 milliseconds. Hence, the LinkXX has a virtual, real time snapshot of the spectrum of interest. This data allows each site to determine where a carrier may be transmitted without interfering with another transmission. SCAN Controller Spectrum Analyzer SCAN Controller M&C Interface Ethernet Interface to LAN (RJ-45) Router Compression Engine Transport Encap/Decap & Serialization RS-530 Data Interface LinkIP SATELLITE MODEM SCAN / LinkIP Functional Block Diagram SCAN White Paper Page 4
5 SCAN operates in basically the same way for both transmit and receive modes. Transmit SCAN determines bandwidth availability, and controls the modulator for activation and deactivation of carriers. Receive SCAN mode tracks new carrier activity in the spectrum and determines who is transmitting each carrier and who is supposed to receive it by tuning local demodulators to those carriers. The LinkXX will accommodate multiple demodulators for this purpose. A single SCAN controller will operate in both modes simultaneously. In transmit SCAN mode, the router makes the decision on when bandwidth is needed and initiates the SCAN process. The SCAN controller provides the interface between the router elements and the satellite modulator and demodulators. Using the spectral data and a randomization routine, it determines an appropriate transmit channel for the modulator. It then tunes the modulator to that frequency, sets a data and FEC rate, and turns on the carrier. SCAN Transmit Process SCAN White Paper Page 5
6 In receive SCAN mode, the router determines whether IP packets acquired by a demodulator are destined for its LAN. If they are, it keeps the demodulator engaged until the transmission is complete then releases the demodulator. If the packets are addressed for another site, it discards those packets received and releases the demodulator immediately. SCAN Receive Process Collision Avoidance and Recovery One of the problems associated with multiple access schemes is that of collisions, or double illumination of the space segment. Multiple safeguards have been built into SCAN to avoid double illumination of carriers. The primary safeguard is SCAN s ability to measure spectral density. If a station activates a carrier and SCAN subsequently detects that the power in its channel has gone to approximately double its normal density (3 db), it will sense that a collision has occurred. It will immediately terminate the transmission and initiate another search for an available channel. Another and even more accurate way to recuperate from a collision, and to have early detection, is to use a timing window. Since the SCAN controller can accurately determine the round trip time (RTT) from the local router to the satellite and back, it can tell when its carrier is the first to arrive in a selected channel slot. The detection takes place on the basis of which carrier arrives first. If a carrier arrives in less time than the RTT for a local transmission, then the controller knows that carrier is not its own transmission. In that case, it will immediately cease transmitting and start the channel selection process again. If it receives a double illumination after its timing window has expired, then it knows that it was the first to transmit and leaves its carrier on the air SCAN White Paper Page 6
7 and waits for the other station to back off. The timing window can be adjusted but +/- 10 milliseconds is generally adequate. The only exception to these rules is when an emergency service (e.g ) is used. In that case, the LinkIP will use any available channel and will double illuminate a channel if none are available. It will stay on the air until everyone else back off of that channel. This is a timed event in the LinkXX such that if a double illumination persists for more than a programmed amount of time (normally 2 seconds) then anyone transmitting on that channel will mark it as an emergency channel temporarily. The other important factor in collision avoidance is to prevent collisions before they happen. In the SCAN system, this can be done by randomizing the selection of transmit channels so that all competing stations using the bandwidth will be evenly distributed in time and frequency over the entire bandwidth. Space Segment Channel Allocation A critical element to SCAN is space segment channel allocation. The available bandwidth needs to be allocated into discrete channels for SCAN to function efficiently. A channel scheme for a network needs to be defined, and then programmed into each LinkXX in the network. Each channel is defined by information rate (IR), FEC rate, and modulation type. Occupied bandwidth is calculated automatically by the scanner on initialization. Channels can be set up so that the spectrum is sub-divided many times, allowing several channel definitions for a range of bandwidth. If a smaller channel is occupied, SCAN will not place a larger carrier in that slot. For example, if a 128 kb/s carrier is active, SCAN will not place a 512, 768, or 1024 carrier in the slots above that active carrier. When a LinkXX router senses incoming data on its LAN port (or serial port, depending on how the LinkXX is configured), it determines the data s Type of Service (ToS) and Quality of Service (QoS). ToS determines what size carrier to transmit. ToS bits are used to select a range of bandwidth for a particular service. Up to six ToS levels can be defined in the LinkXX. ToS can be keyed on service type, destination, origin, packet size, or on other criteria. A minimum acceptable bandwidth and a maximum allowable bandwidth are defined for each ToS. The LinkXX then compares the ToS definitions with spectral occupancy data provided by SCAN to determine which channels are available for the service requested. QoS determines the priority of each service. The LinkXX router uses QoS bits to determine Queuing Priority both when setting up a new circuit and when a circuit is already active. SCAN can detect both spectral density and occupied bandwidth. When searching for an available channel, SCAN first looks for a channel that fits the minimum acceptable bandwidth criteria. If one is not found, it continues to work its way up to the maximum allowable bandwidth channels until it finds an available channel. See LinkSat s website ( for LinkXX data sheets and related application notes. SCAN White Paper Page 7
BANDWIDTH EFFICIENT CELLULAR BACKHAUL SOLUTIONS
BANDWIDTH EFFICIENT CELLULAR BACKHAUL SOLUTIONS LinkIP TM Cellular Solution Overview Backhaul solutions for CDMA, 2G & 3G GSM networks Built-in LinkShrink data compression engine gets 2:1 or better compression
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationRAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationINSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Name Code Class Branch COMPUTER NETWORKS A50515 Year 2017 18 Coordinator
More informationModule 16: Distributed System Structures. Operating System Concepts 8 th Edition,
Module 16: Distributed System Structures, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationComputer network questions for final exam preparation 21/08/2017
Computer network questions for final exam preparation 21/08/2017 Chapter 3 1. What does UDP provide in addition to IP? Answer: provides two services not provided by the IP layer. - It provides port numbers
More informationAfriConnect Satellite Technology Overview
AfriConnect Satellite Technology Overview Topics Why VSAT? Defining The Network Requirements Coverage Traffic & Connectivity Features Public & Private Networks Understanding The Technology VSAT Terminal
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationChapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.
Chapter 6 Local Area Networks and Media Access Control School of Info. Sci. & Eng. Shandong Univ. 6.1 MULTIPLE ACCESS COMMUNICATIONS FIGURE 6.1 Multiple access communications FIGURE 6.2 Approaches to sharing
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationModule 15: Network Structures
Module 15: Network Structures Background Motivation Topology Network Types Communication Design Strategies 15.1 Node Types Mainframes (IBM3090, etc.) example applications: airline reservations banking
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationSimple Satellite Network Solutions. Radyne SkyWire Company Proprietary -- 1
TM Simple Satellite Network Solutions Radyne SkyWire Company Proprietary -- 1 SkyWire is a next generation product TM designed specifically for IP networks running over satellite. SkyWire is an extremely
More informationFrames, Packets and Topologies
Frames, Packets and Topologies Info 341 Networking and Distributed Applications Frames and Packets 1 Motivating Packets What if a network required everything to be sent as a single chunk What happens when
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationLink Layer and LANs. CMPS 4750/6750: Computer Networks
Link Layer and LANs CMPS 4750/6750: Computer Networks 1 Outline overview (6.1) multiple access (6.3) link addressing: ARP (6.4.1) a day in the life of a web request (6.7) 2 Link layer: introduction terminology:
More informationDistributed System Chapter 16 Issues in ch 17, ch 18
Distributed System Chapter 16 Issues in ch 17, ch 18 1 Chapter 16: Distributed System Structures! Motivation! Types of Network-Based Operating Systems! Network Structure! Network Topology! Communication
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005
ECS 152A Computer Networks Instructor: Liu Name: Student ID #: Final Exam: March 17, 2005 Duration: 120 Minutes 1. The exam is closed book. However, you may refer to one sheet of A4 paper (double sided)
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationModule 16: Distributed System Structures
Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationStudent ID: CS457: Computer Networking Date: 5/8/2007 Name:
CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 10 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Name Code Class Branch COMPUTER NETWORKS A50515 Year 2016 17 Coordinator
More informationStudent ID: CS457: Computer Networking Date: 5/8/2007 Name:
CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 10 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationData Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationNetworks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces
Chapter 15 Computer and Multimedia Networks 15.11 Basics of Computer and Multimedia Networks 15.2 Multiplexing Technologies 15.3 LAN and WAN 15.4 Access Networks 15.5 Common Peripheral Interfaces 15.6
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationMultiple-access protocols
Multiple Access Multiple-access protocols Random Access MA CSMA CSMA/CD CSMA/CA RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station.
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationRadyne s SkyWire Gateway Quality of Service
Radyne s SkyWire Gateway Quality of Service White Paper WP026 Rev 1.0 April 2008 Radyne Corporation 3138 E. Elwood St. Phoenix, AZ 85034 (602) 437-9620 Fax: (602) 437-4811 Radyne s SkyWire Gateway Quality
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3
ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationComputer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48
Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes
More informationEECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub
Ethernet -- Topology: Ethernet MAC: Hub Single collision domain Hub Hub Relay Collision! After a collision, stop for a random time wait for a random time, then try again. (Walrand/Varaiya slides) - computers
More informationMidterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122
Topics Midterm Review EECS University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationCS1302 / Computer Networks
CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationCOMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1
Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing
More informationCOMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationEthernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1
Ethernet Network Fundamentals Chapter 9 1 Objectives Identify the basic characteristics of network media used in Ethernet. Describe the physical and data link features of Ethernet. Describe the function
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationLong Distance Wireless Communication. Principally satellite communication:
Long Distance Wireless Communication Principally satellite communication: Uplink/Downlink Footprint LOS (line of sight) communication satellite base station is relay Effective for broadcast Limited bandwidth
More informationCHAPTER TWO LITERATURE REVIEW
CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More information(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker
Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,
More informationChapter 6 The Link Layer and LANs
Chapter 6 The Link Layer and LANs A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationComputer Networks Principles LAN - Ethernet
Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2
More informationUNIVERSITY QUESTIONS
UNIVERSITY QUESTIONS UNIT 1: INTRODUCTION 1) Show the layer representation in the TCP/IP model and the OSI model and Explain. / Dec 12 2) With a neat diagram, explain the TCP/IP reference model, giving
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationYou have to remember that
Review You have to remember that Circuit Switched Network Packet Switched Network To install Dynagen & Dynamips To find a idlepc value To Set up a Router Various Command Contents IP Internetworking Internet
More information